Author of the publication

Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.

, , , , and . ISCC, page 1-7. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated WCET Analysis Based on Program Modes., , , and . AST, page 36-42. ACM, (2006)MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users., , , , and . CollaborateCom, volume 268 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 329-345. Springer, (2018)Modeling Social Engineering Botnet Dynamics across Multiple Social Networks., , , , , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 261-272. Springer, (2012)Poster: recoverable botnets: a hybrid C&C approach., , , and . ACM Conference on Computer and Communications Security, page 833-836. ACM, (2011)Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic., , , , and . ICCNS, page 23-29. ACM, (2022)TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN., , , , , and . GLOBECOM, page 891-896. IEEE, (2022)Grid-Connected Inverter Control Via Linear Parameter-Varying System Approach., , , , , and . IECON, page 1-6. IEEE, (2022)DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph., , , , , and . ICCS (1), volume 13350 of Lecture Notes in Computer Science, page 345-359. Springer, (2022)An two-layer predictive model of ensemble classifier chain for detecting antimicrobial peptides., , , , and . BIBM, page 56-61. IEEE, (2020)Scenario-based analysis and synthesis of real-time systems using uppaal., , , and . DATE, page 447-452. IEEE Computer Society, (2010)